Book demo

Predatar or
Veeam SureBackup

Which one is right for you?

Veeam SureBackup and Predatar are designed with the same purpose in mind – to validate the recoverability and cleanliness of backups. For many Veeam customers, Sure Backup is a great choice, but for others Predatar will be the best option.

Veeam
SureBackup

Predatar logo

Core functionality

Cyber recovery validation for Veeam backups

Advanced cyber recovery validation for backups and primary snapshots

Best-fit customer & tech-stack

  • SME
  • Veeam-only backup environment
  • SME & large enterprise
  • Multi-vendor backup/storage environment
  • Highly regulated industries

Access & Availability

SureBackup is only available as part of the following Veeam subscriptions:

  • Veeam Enterprise Edition
    (limited SureBackup features)
  • Veeam Enterprise Plus Edition
  • Veeam Data Platform Advanced Edition
  • Veeam Data Platform Premium Edition
  • Veeam Availability Suite (includes Backup & Replication with Veeam ONE)

Note: To utilise all SureBackup features, customers require Veeam ONE and Veeam Recovery Orchestrator.

Predatar is a standalone subscription platform.

Available to all Veeam Backup & Replication users, regardless of their Veeam subscription package.

Backup software supported

Built for Veeam Backup & Replication

Platform agnostic. Currently supports:

  • Veeam Backup & Replication
  • Rubrik
  • Cohesity
  • IBM Storage Protect
  • IBM Storage Protect+
  • IBM Storage Defender Data Protect

Primary snapshots supported

  • IBM FlashSystem SafeGuarded Copies
  • Pure Storage Immutable Snapshots

Workload types

  • Windows Virtual Machines (VMWare and Hyper V)
  • Linux Virtual Machines (VMWare and Hyper V)
  • Windows Bare Metal Servers (requires Veeam Backup Agents)
  • Linux Physical Bare Metal Servers (requires Veeam Backup Agents)
  • Windows Virtual Machines (VMWare and Hyper V)
  • Linux Virtual Machines (VMWare and Hyper V)
  • Windows Bare Metal Servers
  • Linux Bare Metal Servers
  • AIX Workloads
  • SQL Databases

Validation tests

Heartbeat/Power-on test
To confirm workload is powered-on and responsive (via VMware tools/Hyper-V integration services).

Ping test
To confirm network responsiveness.

Application-level script tests
To validate that critical applications or services are running correctly.

Boot time verification
To ensure OS boots within an acceptable time window.

Antivirus Signature scan
To verify that VM workloads are free from known virus signatures (more details below).

Heartbeat /Power-on test
To confirm VM is powered-on and responsive.

Network card test
to confirm network connectivity.

Full restore / failover test
To ensure workloads are recoverable.

Boot time verification to ensure OS loads within an acceptable window.

Recovery/Failover time recorded
To ensure recovery time objectives are achievable.

Antivirus Signature scan
To verify that VM workloads are free from known virus signatures (more details below).

Deep malware interrogation
To verify that workloads are free from malware using multiple advanced detection techniques (more details below).

Automation/orchestration capabilities

  • Pre-defined workflows
  • Scheduled-based automations
  • Highly customisable
  • Scheduled-based automations
  • Threat alert and SIEM triggered automations

SIEM integration

One-way ‘push’ Integration can be achieved using custom PowerShell scripting, and Rest API and SysLog agents.

Two-way out-of-the-box integration with:

  • QRadar
  • Splunk
  • Microsoft Sentinel

Integrated Malware detection engine

Clam AV open-source antivirus software

  • Software type:
    Opensource antivirus engine
  • Automation:
    Not supported
  • Threat intelligence:
    No built-in threat intelligence feeds
  • 500-2,000
    new virus definitions added daily

TrendMicro VisionOne XDR (Extended Detection & Response) platform

  • Software type:
    Enterprise grade XDR platform
  • Automation:
    Built-in
  • Threat intelligence:
    Global Threat Intelligence (Smart Protection Network), zero-day detection
  • Up to 500,0000
    new virus definitions added daily
Accordion Dots

Solution Brief

Predatar for Veeam
Backup & Replication

Read the Solution Brief to learn how easy it is to add
AI-powered recovery testing and malware
interrogation to Veeam Backup & Replication.

 

 

Case study

Preventing a Cyber Emergency

Industry: Healthcare
Region: United States
Platform: Veeam

Read study

FAQs

 

Yes. Predatar provides an alternative option for Veeam Backup & Replication users with a requirement to validate the recoverability and cleanliness of their backups.

Here’s 3 key differences:

1.
Veeam SureBackup is built exclusively for Veeam Backup and Replication users. Predatar is a vendor agnostic solution and can be used to validate backups and snapshots made with several other vendor’s backup software and storage products

2.
Veeam SureBackup validates workloads on-demand. Predatar is an automated ‘always-on’ solutions which validates workloads 24/7 based on pre-defined schedules, and real-time threat intelligence.

3.
Veeam is designed to validate Virtual Machines. Predatar supports a broader range of workloads including Virtual Machines, File Systems, Databases and Containers.

 

Veeam SureBackup is only available to Veeam Backup & Replication customers on some subscription plans (see table above for details). Veeam Customers on different plans will need to upgrade their subscription to access SureBackup.

There are also some additional technical requirements which mean that SureBackup may not be compatible with your infrastructure. For example, SureBackup requires on-premise hypervisors and a proxy appliance. It is not suitable for a fully Cloud-based Veeam deployment.

In most instances where SureBackup is not a feasible option, Predatar will be a viable alternative.

For some Veeam customers, SureBackup will be available at no additional cost. If SureBackup is not included in your plan, it’s likely that Predatar will be a more cost-effective option versus upgrading your Veeam plan. However, this will vary depending on the size of backup environment and your current Veeam plan.

Predatar has been proven to perform validation of backup VMs approximately 5x faster than Veeam SureBackup in a controlled lab test.

Yes. With Veeam SureBackup users can use ClamAV, and open-source antivirus engine to scan backups for malware signatures. If known signatures are present ClamAV will raise an alert, even if the malware is in an inactive state.

In addition to ClamAV, Predatar incorporates Trend Micro Vision One. A market-leading, enterprise grade XDR platform. Trend Micro Vision One leverages advanced threat detection methods, AI/ML-driven behavioural analytics, signature-based, heuristic, and telemetry correlation. On average, 500,000 threat definitions are added to Trend Micro’s threat intelligence database every day, significantly increasing the chances of malware detection, including zero-day attacks.

Veeam SureBackup is designed to work only with Veeam Backup & Replication. Predatar is platform agnostic and supports multiple backup vendors including Veeam, Rubrik, Cohesity, IBM Storage Protect, Protect Plus and IBM Defender Data Protect.

SureBackup does not support primary snapshots. Predatar does – it can validate immutable snapshots from IBM FlashSystem (SafeGuarded Copies) and Pure Storage.

SureBackup is limited to Windows and Linux Virtual Machines. Predatar goes further, supporting virtual machines, bare metal servers (Windows, Linux, AIX), and SQL Databases.

SureBackup includes tests such as power-on, heartbeat, ping, boot time, and script-based application checks. Predatar includes those, and adds full XDR scans, automated malware cleansing and quarantining.

SureBackup runs orchestrated tests based on schedules. Predatar automations run 24/7, triggered by schedules or real-time threat intelligence.

SureBackup requires custom scripting via PowerShell to achieve one-way SIEM integration. Predatar includes two-way API integration with QRadar, Splunk and Microsoft Sentinel ‘out of the box’.

SureBackup uses ClamAV, an open-source antivirus engine with basic signature-based scanning and no automation. Predatar uses Trend Micro Vision One, which adds AI, machine learning, heuristic analysis, telemetry correlation and global threat intelligence, all fully automated and enterprise-grade.

Veeam do not publish statistics on this. Predatar however has found malware and ransomware in more than 80% of its customer backup environments that their production security tools missed.